Microsoft 365 Multi-Factor Authentication Setup

Environment:  StFX account holders enrolled in or preparing for Microsoft 365 Multi-Factor Authentication, enabling access from any browser with an internet connection. 

Purpose: For configuring Microsoft 365 Multi-Factor Authentication methods.

If you access email off campus through any application, you will need to complete authentication for Microsoft 365 MFA.  Having multiple authentication methods configured for your Microsoft 365 access is essential to prevent access loss.  Microsoft 365 will allow for multiple options to be configured and you can choose which method is your default.  We recommend the following options be configured.  

Accessing your methods

  1. Go to and select Update Information
  2. Log in using your stfx email address and password

Recommended methods

The most popular method for Multi-Factor Authentication is using an Authenticator App.  If you have a mobile device we recommend setting up the following methods 

  • Authenticator App - Code & Notification Setup
  • SMS  (Text message send to your mobile device
  • Phone (Microsoft will Call during the setup, the call recipient will need to press # to verify)

If you have a mobile device we recommend configuring the Microsoft Authenticator application.  Other authenticator applications can also be configured for your Microsoft 365 MFA options if you have an authenticator app you are presently using.

If you do not have a mobile device to use for authentication you can request a hardware token.   Hard ware token user are still strongly suggested to set up a phone method, such as their home number as a backup method.


Setup Microsoft Authentication Methods

Microsoft Authenticator App Setup (Recommended) - Does not require data

SMS (Text Message) -Requires Data or Wifi Connection

Phone Call -Requires access to phone being called

External email is an option for configuration BUT  Microsoft will only allow this method to be used for password recovery.   External email is not considered secure for Multi-Factor Authentication.

Hardware Tokens

Hardware tokens can be requested if there is no mobile device that can be used.    Hardware tokens can be requested through our Hardware Token Request form.

Where ever possible, hardware token users are encouraged to configure a phone number as a backup method.


Article ID: 89469
Mon 4/26/21 12:58 PM
Fri 5/7/21 2:57 PM